[1]冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,22(1):71-83.
[2]LI M,YU S,CAO N,et al.Authorized private keyword search over encrypted data in cloud computing[C]//Proceedings of International Conference on Distributed Computing Systems.Washington D.C.,USA:IEEE Press,2011:383-392.
[3]SONG D X,WAGNER D,PERRIG A.Practical techniques for searches on encrypted data[C]//Proceedings of IEEE Symposium on Security and Privacy.Washington D.C.,USA:IEEE Press,2002:0044.
[4]吴岱霓,王晓明.云环境下的多用户模糊检索加密方案[J].计算机工程,2016,42(5):18-22.
[5]LI J,WANG Q,WANG C,et al.Fuzzy keyword search over encrypted data in cloud computing[C]//Proceedings of the 29th conference on Information communications.Washington D.C.,USA:IEEE Press,2010:441-445.
[6]WANG B,YU S,LOU W,et al.Privacy-preserving multi-keyword fuzzy search over encrypted data in the cloud[C]//Proceedings of IEEE Conference on Computer Communications.Washington D.C.,USA:IEEE Press,2014:2112-2120.
[7]CAO N,WANG C,LI M,et al.Privacy-preserving multi-keyword ranked search over encrypted cloud data[J].IEEE Transactions on Parallel and Distributed Systems,2013,25(1):222-233.
[8]KHAN N S,KRISHNA C R,KHURANA A.Secure ranked fuzzy multi-keyword search over outsourced encrypted cloud data[C]//Proceedings of International Conference on Com-puter and Communication Technology.Washington D.C.,USA:IEEE,2015:241-249.
[9]张俭恭,陈定权.汉字全文检索系统的关键技术与实现[J].现代图书情报技术,2001,17(2):16-18.
[10]DING W,LIU Y,ZHANG J.Chinese-keyword fuzzy search and extraction over encrypted patent documents[C]//Proceedings of the 7th International Joint Conference on Knowledge Discovery,Knowledge Engineering and Knowledge Management.Washington D.C.,USA:IEEE Press,2015:168-176.
[11]CAO Jiang,WU Xiaojun,XIA Yunqing,et al.Pinyin-indexed method for approximate matching in Chinese[J].Journal of Tsinghua University (Science and Technology),2009,49(S1):1328-1332.
[12]陈何峰,林柏钢,杨旸,等.基于密文的中文关键词模糊搜索方案[J].信息网络安全,2014(7):69-74.
[13]方忠进,周舒,夏志华.基于关键词的加密云数据模糊搜索策略研究[J].计算机科学,2015,42(3):136-139.
[14]李陶深,王翼,黄汝维.云环境下支持多用户模糊检索加密算法研究[J].小型微型计算机系统,2016,37(10):2244-2248.
[15]BLOOM B H.Space/time trade-offs in hash coding with allowable errors[J].Communications of the ACM,1970,13(7):422-426.
[16]DATAR M,IMMORLICA N,INDYK P,et al.Locality-sensi-tive hashing scheme based on p-stable distributions[C]//Proceedings of the 20th Symposium on Computational Geometry.New York,USA:ACM Press,2004:253-262. |